CESA-2016:0611 Critical CentOS 6 samba SecurityUpdate

CentOS Errata and Security Advisory 2016:0611 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0611.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
d5f3744dc798fa513d4856aad3a992e836a3c6b29244fbfef4b0b42da1badbac  libsmbclient-3.6.23-30.el6_7.i686.rpm
43d3dc3550f227a2aa80d2dd9b347b2f671c17f3b93be5af1f53bd150033c855  libsmbclient-devel-3.6.23-30.el6_7.i686.rpm
4a88c261160bef72540e2f059ad91bd858721721d5953d5002ca1c07df0d72e0  samba-3.6.23-30.el6_7.i686.rpm
bbef66997ee8db5f11941f3cfc7743669ffd283a095fce30426a1a45a7122e90  samba-client-3.6.23-30.el6_7.i686.rpm
6818dc38fab7ce3988ef31093a1a7cede168c659f68e8c16cb410188a2031afc  samba-common-3.6.23-30.el6_7.i686.rpm
cb2ef5bcb21579e00e057a2ad94f3dd9aa3d5e890d551c5aa7aef1a0d933654a  samba-doc-3.6.23-30.el6_7.i686.rpm
d846675e8d283928d09c9b1414519b9f1804c79d520f4053a0b5b760f3994785  samba-domainjoin-gui-3.6.23-30.el6_7.i686.rpm
137008daf97775269fc041e11bac7da43fe2bf7e249b3bb24444ea5e7bc40c69  samba-swat-3.6.23-30.el6_7.i686.rpm
6a1036223e11a3793b9511cc50e55790b5803736c56f11ed9e74f06786731c99  samba-winbind-3.6.23-30.el6_7.i686.rpm
b95ec7df22dac5a52f2932f4d042eb7b778bb1f2140e4eabe45a0fb2335475ba  samba-winbind-clients-3.6.23-30.el6_7.i686.rpm
81288d625b467cfe0286bfdb3e6d8f9c5ac25d8a74d579be7d82edca735ff8ad  samba-winbind-devel-3.6.23-30.el6_7.i686.rpm
0e0ef67e0ee5917670417fb214ac137597e94af528c7763250be83b398ac7bbf  samba-winbind-krb5-locator-3.6.23-30.el6_7.i686.rpm

x86_64:
d5f3744dc798fa513d4856aad3a992e836a3c6b29244fbfef4b0b42da1badbac  libsmbclient-3.6.23-30.el6_7.i686.rpm
3bdd46b034cf383f8c1d9baa3eeda1bd9500feff1a730982677f138c3d45fe25  libsmbclient-3.6.23-30.el6_7.x86_64.rpm
43d3dc3550f227a2aa80d2dd9b347b2f671c17f3b93be5af1f53bd150033c855  libsmbclient-devel-3.6.23-30.el6_7.i686.rpm
7f7427ca3b30314a21a521bd15c12871e6f1a9700c0526768f8b4471cf5f22a0  libsmbclient-devel-3.6.23-30.el6_7.x86_64.rpm
986adb3d503c23bc34318acb88b65ae18c1c436924d142b7efebfc36089d44a8  samba-3.6.23-30.el6_7.x86_64.rpm
537cd77805d7d630691ded245d6bf4309abae69b8ee2d5d074d1efcf3c2af289  samba-client-3.6.23-30.el6_7.x86_64.rpm
6818dc38fab7ce3988ef31093a1a7cede168c659f68e8c16cb410188a2031afc  samba-common-3.6.23-30.el6_7.i686.rpm
8ca451ffd4acc3307c38f283a0ac53de744486718106ce298fe5a70988a45a40  samba-common-3.6.23-30.el6_7.x86_64.rpm
e42be934a8fad357849cde0f8abb5021ff241afa85c0b0231b7b7b33c4e6e9f4  samba-doc-3.6.23-30.el6_7.x86_64.rpm
9b099c55345b1b72058685c5f7f9c706ce6035ea49a35636eb9d3f3b12521eca  samba-domainjoin-gui-3.6.23-30.el6_7.x86_64.rpm
6f8245cdcd8b4a4ca41953d9d6f154eb1d29e6fba2ef0e12a487ebb3cfe29892  samba-glusterfs-3.6.23-30.el6_7.x86_64.rpm
63f6438db62cc07cec6d0178ba85f99a7f8575b63b4dae605718a45b5e536782  samba-swat-3.6.23-30.el6_7.x86_64.rpm
9adf99d2ad7f21aa7197f86b71f2ec35d900905d143ccafafaec46f34100a0b0  samba-winbind-3.6.23-30.el6_7.x86_64.rpm
b95ec7df22dac5a52f2932f4d042eb7b778bb1f2140e4eabe45a0fb2335475ba  samba-winbind-clients-3.6.23-30.el6_7.i686.rpm
91432d4c81b78544df59b6018e524f6eb54153120a33c7e9baa45e808672496a  samba-winbind-clients-3.6.23-30.el6_7.x86_64.rpm
81288d625b467cfe0286bfdb3e6d8f9c5ac25d8a74d579be7d82edca735ff8ad  samba-winbind-devel-3.6.23-30.el6_7.i686.rpm
d21906730e1f57fbe542289ad49b20c15013d273b5e00a9306f1fe79d1105a61  samba-winbind-devel-3.6.23-30.el6_7.x86_64.rpm
4df6beae3fa75c188cc3dda5e07b090d5788727b9a97bcfbb648e76def3a6b77  samba-winbind-krb5-locator-3.6.23-30.el6_7.x86_64.rpm

Source:
75c462f3c41c2ef7d0a4cb7dd92dcec558d885ccfc325b98075d7955da277a28  samba-3.6.23-30.el6_7.src.rpm



CESA-2016:0612 Critical CentOS 6 openchangeSecurity Update

CentOS Errata and Security Advisory 2016:0612 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0612.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
ac09b0d9d4fbc08ab158a76f396655e3697d7429628b74a2a327983aafb3b055  openchange-1.0-7.el6_7.i686.rpm
11541436668a21bbc19b6db1eb3f0c0eb81c4b835f9f7691a2a1da3463d3b6cb  openchange-client-1.0-7.el6_7.i686.rpm
0942c83391d80345828dcff6eb7b1566d0418d84ca46d019ee1058f953e614ad  openchange-devel-1.0-7.el6_7.i686.rpm
89cee9b1759fda0d2241e29977c8df551a1622194fa42f4c74797cb03bbba276  openchange-devel-docs-1.0-7.el6_7.i686.rpm

x86_64:
be5cbb504467d580f23e599b9b4dcf79cd7e0bb39bd17b5b16a779b5d2dcdefc  openchange-1.0-7.el6_7.x86_64.rpm
311bce330e2dd8daceb280ba56fca1be3f66621ec9bd1b478ee16d78dfec215a  openchange-client-1.0-7.el6_7.x86_64.rpm
1a83a0aef193af992c641f5dbf0f3be2e4d6731ed6e9807239b770526bb1c20f  openchange-devel-1.0-7.el6_7.x86_64.rpm
ddfca3816ea245228ca0fc27a8421b261a8918aeeb807a89728de107bac79873  openchange-devel-docs-1.0-7.el6_7.x86_64.rpm

Source:
2b36600e73bc777894381afd958eefa600c110b620435debb0d6c4b6cb9606f4  openchange-1.0-7.el6_7.src.rpm



CVE-2016-4009

Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow. (CVSS:10.0) (Last Update:2016-04-25)

CVE-2016-2533

Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. (CVSS:4.3) (Last Update:2016-04-18)

CVE-2016-0740

Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file. (CVSS:4.3) (Last Update:2016-04-18)

CVE-2016-0775

Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file. (CVSS:4.3) (Last Update:2016-04-18)

CVE-2016-0088

Hyper-V in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka “Hyper-V Remote Code Execution Vulnerability.”

CVE-2016-0089

Hyper-V in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka “Hyper-V Information Disclosure Vulnerability.”

CVE-2016-0090

Hyper-V in Microsoft Windows 8.1, Windows Server 2012 R2, and Windows 10 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka “Hyper-V Information Disclosure Vulnerability.”